首页> 外国专利> System and method for comprehensive general common protection of computer against evil programs that might or cause damage and / or steal information

System and method for comprehensive general common protection of computer against evil programs that might or cause damage and / or steal information

机译:用于对计算机进行全面通用保护的系统和方法,以防可能或引起损坏和/或窃取信息的恶意程序

摘要

(57) (to steal data, such as destroying data or change the data) is evil and software attacks on (through the Internet in particular) a small device that is computerized and other [summary] personal computer or server / year while causing a damage of several tens of million U.S. dollars, it is becoming increasingly dangerous and increasingly common. The solution of the latest, instead of them enters deeply into the root of the problem, because it solves the problem only a limited number of on the surface, there is a limit in nature. Solution of common, is a network firewall and anti-virus most. The anti-virus, it is only the can (usually after they attacked computer already many) that already identified they detect viruses and worms, is limited. The network firewall is based on packet filtering, or accept any packet since it may contain a subjective decision based on, for example, to trust a certain site or application there, This is a limit in principle there. However, security for any reason, for example, by deception was intended or error, it is violated, the (direct or applications that hostility evil additional that can be produce damage and infinite hijack the entire network or server or computer once By opening the door to applications). They can also, for example, it is not effective against security holes in opal rating system itself or in the E-mail program or browser. According to an article in ZDnet of January 24, 2001, security holes in critical application because it is found very frequently, keep up on all patch exactly it is impractical. Also, for example (any evil program, without knowledge about it in advance, such as can be identified) appropriate and common protection against Trojan Horse without, VPN digital sign and (virtual private network) , including, even other forms of data encryption, but instead can be stolen or lower before the encryption information, it is not really safe. By entering to push deeper into the root of the problem, the present invention produces a comprehensive solution to a common common. As a default, the program, with respect to other programs or to data files or their decisive for the files on the operating system, one of the greatest absurdity of the situation of the latest technology, it prefers is that it allows you to do anything that, to let bother to customers any other, as he prefers to hotel guests, this is it, or copy it or steal their property the (property) It is also ridiculous to destroy, and to destroy their room, etc., for example, or elevator control room or electronic switch board, or a cause free access to the phone or the hotel safe. This concept is based on automatically divided between programs Customer: each to be able to obtain a privileged additional only by the authorization that was clear, this is in his room as the default guest each This is similar to limiting as the default access his strategic resources of the hotel and to limit to (resources) only.
机译:(57)(窃取数据,例如销毁数据或更改数据)是邪恶的,并且(特别是通过Internet)对计算机化的小型设备以及其他[摘要]个人计算机或服务器的软件攻击/年造成了损害数千万美元,它变得越来越危险,越来越普遍。最新的解决方案而不是深入解决问题的根源,因为它只能解决有限数量的表面问题,因此本质上是有限制的。常见的解决方案,是网络防火墙和杀毒软件最多的。防病毒功能(通常是在他们已经攻击了很多计算机之后)才能够识别出它们检测到病毒和蠕虫的能力受到限制。网络防火墙基于数据包过滤,或者接受任何数据包,因为它可能包含基于例如信任某个站点或应用程序的主观决定。这在原则上是一个限制。但是,出于任何原因的安全性(例如,通过欺骗的意图或错误,违反安全性)(直接或带有敌意的应用程序都可能会造成恶意破坏,并无限期劫持整个网络,服务器或计算机)到应用程序)。例如,它们还可能无法有效抵御蛋白石评级系统本身或电子邮件程序或浏览器中的安全漏洞。根据2001年1月24日ZDnet上的一篇文章,由于经常发现关键应用程序中的安全漏洞,因此完全跟踪所有补丁都是不切实际的。同样,例如(任何邪恶的程序,如果事先不知道它,就可以识别出来)对没有木马,没有VPN数字标志和(虚拟专用网)的特洛伊木马程序提供适当且通用的保护,甚至包括其他形式的数据加密,但实际上可以在加密信息之前被窃取或降低,这并不是真正安全的。通过深入研究问题的根源,本发明产生了对共同的共同点的全面解决方案。默认情况下,该程序相对于其他程序或数据文件或它们对于操作系统上文件的决定性,是最新技术情况中最荒唐的一种,它更喜欢它允许您执行任何操作就是说,要打扰顾客,就像他更喜欢酒店客人一样,或者复制或窃取他们的财产(财产),例如销毁和破坏他们的房间等都是荒谬的。 ,电梯控制室或电子开关板,或者可免费使用电话或酒店保险箱。此概念基于自动在程序之间划分的客户:每个人都只能通过明确的授权来获得特权附加,这作为默认来宾在他的房间中,这类似于限制默认访问他的战略资源的酒店,并且仅限于(资源)。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号